WO2001060024A3 - Systeme et procede d'evaluation de la posture de securite d'un reseau - Google Patents
Systeme et procede d'evaluation de la posture de securite d'un reseau Download PDFInfo
- Publication number
- WO2001060024A3 WO2001060024A3 PCT/US2001/003105 US0103105W WO0160024A3 WO 2001060024 A3 WO2001060024 A3 WO 2001060024A3 US 0103105 W US0103105 W US 0103105W WO 0160024 A3 WO0160024 A3 WO 0160024A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- object model
- model database
- system object
- assessing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99938—Concurrency, e.g. lock management in shared database
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Debugging And Monitoring (AREA)
- Monitoring And Testing Of Transmission In General (AREA)
- Investigating Or Analysing Biological Materials (AREA)
Abstract
Priority Applications (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AT01924088T ATE300145T1 (de) | 2000-02-08 | 2001-01-31 | Vorrichtung und verfahren zur beurteilung der verletzlichkeit des netzsicherheit |
| DE60112044T DE60112044T2 (de) | 2000-02-08 | 2001-01-31 | Vorrichtung und verfahren zur beurteilung der verletzlichkeit des netzsicherheit |
| EP01924088A EP1254551B1 (fr) | 2000-02-08 | 2001-01-31 | Systeme et procede d'evaluation de la posture de securite d'un reseau |
| AU2001250773A AU2001250773A1 (en) | 2000-02-08 | 2001-01-31 | System and method for assessing the security posture of a network |
| CA002397375A CA2397375A1 (fr) | 2000-02-08 | 2001-01-31 | Systeme et procede d'evaluation de la posture de securite d'un reseau |
| JP2001559232A JP4688395B2 (ja) | 2000-02-08 | 2001-01-31 | ネットワークのセキュリティ態勢を評価するためのシステム及び方法 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US09/500,108 US7096502B1 (en) | 2000-02-08 | 2000-02-08 | System and method for assessing the security posture of a network |
| US09/500,108 | 2000-02-08 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2001060024A2 WO2001060024A2 (fr) | 2001-08-16 |
| WO2001060024A3 true WO2001060024A3 (fr) | 2002-02-14 |
Family
ID=23988063
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2001/003105 Ceased WO2001060024A2 (fr) | 2000-02-08 | 2001-01-31 | Systeme et procede d'evaluation de la posture de securite d'un reseau |
Country Status (11)
| Country | Link |
|---|---|
| US (1) | US7096502B1 (fr) |
| EP (1) | EP1254551B1 (fr) |
| JP (1) | JP4688395B2 (fr) |
| KR (1) | KR100673823B1 (fr) |
| CN (1) | CN1172507C (fr) |
| AT (1) | ATE300145T1 (fr) |
| AU (1) | AU2001250773A1 (fr) |
| CA (1) | CA2397375A1 (fr) |
| DE (1) | DE60112044T2 (fr) |
| TW (1) | TW550913B (fr) |
| WO (1) | WO2001060024A2 (fr) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8941464B2 (en) | 2005-10-21 | 2015-01-27 | Honeywell International Inc. | Authorization system and a method of authorization |
| US9019070B2 (en) | 2009-03-19 | 2015-04-28 | Honeywell International Inc. | Systems and methods for managing access control devices |
| US9280365B2 (en) | 2009-12-17 | 2016-03-08 | Honeywell International Inc. | Systems and methods for managing configuration data at disconnected remote devices |
| US9344684B2 (en) | 2011-08-05 | 2016-05-17 | Honeywell International Inc. | Systems and methods configured to enable content sharing between client terminals of a digital video management system |
Families Citing this family (120)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7574740B1 (en) * | 2000-04-28 | 2009-08-11 | International Business Machines Corporation | Method and system for intrusion detection in a computer network |
| US7162649B1 (en) * | 2000-06-30 | 2007-01-09 | Internet Security Systems, Inc. | Method and apparatus for network assessment and authentication |
| AU2001295016A1 (en) * | 2000-09-01 | 2002-03-13 | Sri International, Inc. | Probabilistic alert correlation |
| US6996845B1 (en) * | 2000-11-28 | 2006-02-07 | S.P.I. Dynamics Incorporated | Internet security analysis system and process |
| JP4733885B2 (ja) * | 2001-09-29 | 2011-07-27 | 株式会社東芝 | 脆弱性評価プログラム、方法及びシステム |
| WO2003036914A1 (fr) * | 2001-10-25 | 2003-05-01 | General Dynamics Government Systems Corporation | Procede et systeme de modelisation, d'analyse et d'affichage d'evenements lies a la securite d'un reseau |
| US7257630B2 (en) * | 2002-01-15 | 2007-08-14 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
| US7543056B2 (en) | 2002-01-15 | 2009-06-02 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
| KR20050026929A (ko) * | 2002-06-18 | 2005-03-16 | 컴퓨터 어소시에이츠 싱크, 인코포레이티드 | 기업 자산을 관리하기 위한 방법 및 시스템 |
| US20030236994A1 (en) * | 2002-06-21 | 2003-12-25 | Microsoft Corporation | System and method of verifying security best practices |
| US8407798B1 (en) | 2002-10-01 | 2013-03-26 | Skybox Secutiry Inc. | Method for simulation aided security event management |
| US6952779B1 (en) * | 2002-10-01 | 2005-10-04 | Gideon Cohen | System and method for risk detection and analysis in a computer network |
| KR20040035572A (ko) * | 2002-10-22 | 2004-04-29 | 최운호 | 정보 인프라에서의 종합 침해사고 대응시스템 및 그운영방법 |
| US20040153665A1 (en) * | 2003-02-03 | 2004-08-05 | Logan Browne | Wireless network control and protection system |
| WO2004075006A2 (fr) | 2003-02-14 | 2004-09-02 | Preventsys, Inc. | Systeme d'assurance de politiques de verification de reseau |
| US7636324B2 (en) * | 2003-02-25 | 2009-12-22 | Ayman Esam Nassar | System and method for automated provisioning of inter-provider internet protocol telecommunication services |
| JP2006526193A (ja) | 2003-05-17 | 2006-11-16 | マイクロソフト コーポレーション | セキュリティリスクを評価するための機構 |
| GB2403309B (en) * | 2003-06-27 | 2006-11-22 | Hewlett Packard Development Co | Apparatus for and method of evaluating security within a data processing or transactional environment |
| US20050204032A1 (en) * | 2003-07-17 | 2005-09-15 | Attaullah Mirza-Baig | Remote device management of software only solution |
| US7580909B2 (en) * | 2003-08-26 | 2009-08-25 | Northrop Grumman Corporation | Visual representation tool for structured arguments |
| US7523484B2 (en) | 2003-09-24 | 2009-04-21 | Infoexpress, Inc. | Systems and methods of controlling network access |
| US7526806B2 (en) * | 2003-11-05 | 2009-04-28 | Cisco Technology, Inc. | Method and system for addressing intrusion attacks on a computer system |
| US8272053B2 (en) | 2003-12-18 | 2012-09-18 | Honeywell International Inc. | Physical security management system |
| US8561154B2 (en) * | 2003-12-22 | 2013-10-15 | International Business Machines Corporation | Method for providing network perimeter security assessment |
| US8201257B1 (en) | 2004-03-31 | 2012-06-12 | Mcafee, Inc. | System and method of managing network security risks |
| CN100372296C (zh) * | 2004-07-16 | 2008-02-27 | 北京航空航天大学 | 具有二级决策内核的网络入侵检测系统及其报警优化方法 |
| US20060075503A1 (en) * | 2004-09-13 | 2006-04-06 | Achilles Guard, Inc. Dba Critical Watch | Method and system for applying security vulnerability management process to an organization |
| CN100373865C (zh) * | 2004-11-01 | 2008-03-05 | 中兴通讯股份有限公司 | 计算机攻击的威胁评估方法 |
| US9083748B2 (en) | 2004-12-16 | 2015-07-14 | Hewlett-Packard Development Company, L.P. | Modelling network to assess security properties |
| US7657942B2 (en) * | 2005-01-11 | 2010-02-02 | International Business Machines Corporation | Method of assuring enterprise security standards compliance |
| US7822747B2 (en) * | 2005-01-12 | 2010-10-26 | Metier, Ltd. | Predictive analytic method and apparatus |
| US20060265324A1 (en) * | 2005-05-18 | 2006-11-23 | Alcatel | Security risk analysis systems and methods |
| US7743421B2 (en) | 2005-05-18 | 2010-06-22 | Alcatel Lucent | Communication network security risk exposure management systems and methods |
| WO2007022111A1 (fr) * | 2005-08-17 | 2007-02-22 | Honeywell International Inc. | Systeme de gestion de securite physique |
| US8095984B2 (en) | 2005-09-22 | 2012-01-10 | Alcatel Lucent | Systems and methods of associating security vulnerabilities and assets |
| US8438643B2 (en) | 2005-09-22 | 2013-05-07 | Alcatel Lucent | Information system service-level security risk analysis |
| US8544098B2 (en) | 2005-09-22 | 2013-09-24 | Alcatel Lucent | Security vulnerability information aggregation |
| CN100401294C (zh) * | 2005-09-30 | 2008-07-09 | 南京大学 | 基于关系数据库信息技术产品保护轮廓的完整性检查方法 |
| US20070113185A1 (en) * | 2005-11-16 | 2007-05-17 | Microsoft Corporation | Intelligent network diagram layout |
| CN100403691C (zh) * | 2005-11-17 | 2008-07-16 | 郭世泽 | 网络信息系统的安全性及生存性评估的系统和方法 |
| US20070156420A1 (en) * | 2005-12-29 | 2007-07-05 | Microsoft Corporation | Performance modeling and the application life cycle |
| US20070157311A1 (en) * | 2005-12-29 | 2007-07-05 | Microsoft Corporation | Security modeling and the application life cycle |
| US20070192344A1 (en) * | 2005-12-29 | 2007-08-16 | Microsoft Corporation | Threats and countermeasures schema |
| US7890315B2 (en) | 2005-12-29 | 2011-02-15 | Microsoft Corporation | Performance engineering and the application life cycle |
| US20070156691A1 (en) * | 2006-01-05 | 2007-07-05 | Microsoft Corporation | Management of user access to objects |
| US7818788B2 (en) * | 2006-02-14 | 2010-10-19 | Microsoft Corporation | Web application security frame |
| US7712137B2 (en) | 2006-02-27 | 2010-05-04 | Microsoft Corporation | Configuring and organizing server security information |
| DE102006014793A1 (de) * | 2006-03-29 | 2007-10-04 | Siemens Ag | Sicherheitsanalysator eines Kommunikationsnetzes |
| US8413237B2 (en) * | 2006-10-23 | 2013-04-02 | Alcatel Lucent | Methods of simulating vulnerability |
| FR2910204B1 (fr) * | 2006-12-14 | 2009-03-20 | Netasq Sa | Systeme et procede de surveillance passive d'un reseau de communication |
| US8392997B2 (en) * | 2007-03-12 | 2013-03-05 | University Of Southern California | Value-adaptive security threat modeling and vulnerability ranking |
| US8266518B2 (en) * | 2008-01-16 | 2012-09-11 | Raytheon Company | Anti-tamper process toolset |
| US7792922B2 (en) * | 2008-03-05 | 2010-09-07 | Caterpillar Inc. | Systems and methods for managing health of a client system |
| US8447181B2 (en) | 2008-08-15 | 2013-05-21 | Tellabs Operations, Inc. | Method and apparatus for displaying and identifying available wavelength paths across a network |
| US8873956B2 (en) * | 2008-08-15 | 2014-10-28 | Tellabs Operations, Inc. | Method and apparatus for planning network configuration in an optical network |
| US8712237B2 (en) * | 2008-08-15 | 2014-04-29 | Tellabs Operations, Inc. | Method and apparatus for reducing cost of optical amplification in a network |
| US9112789B2 (en) * | 2008-08-15 | 2015-08-18 | Tellabs Operations, Inc. | Method and apparatus for simplifying planning and tracking of multiple installation configurations |
| EP2332386A4 (fr) | 2008-09-30 | 2014-07-23 | Honeywell Int Inc | Systèmes et procédés permettant d'interagir avec des dispositifs de contrôle d'accès |
| WO2010048977A1 (fr) * | 2008-10-29 | 2010-05-06 | Siemens Aktiengesellschaft | Procédé pour protéger un réseau d’alimentation |
| US20100131617A1 (en) * | 2008-11-25 | 2010-05-27 | John Osborne | Method and system for differential transmission of web page structures |
| US20100218256A1 (en) * | 2009-02-26 | 2010-08-26 | Network Security Systems plus, Inc. | System and method of integrating and managing information system assessments |
| US8878931B2 (en) | 2009-03-04 | 2014-11-04 | Honeywell International Inc. | Systems and methods for managing video data |
| US8359652B2 (en) * | 2009-10-31 | 2013-01-22 | Microsoft Corporation | Detecting anomalies in access control lists |
| US8495745B1 (en) * | 2009-11-30 | 2013-07-23 | Mcafee, Inc. | Asset risk analysis |
| US8495747B1 (en) | 2010-03-31 | 2013-07-23 | Mcafee, Inc. | Prioritizing asset remediations |
| CN101951329B (zh) * | 2010-09-27 | 2013-01-16 | 北京系统工程研究所 | 一种网络安全态势评估方法及系统 |
| RU2449348C1 (ru) * | 2010-11-01 | 2012-04-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ для антивирусной проверки на стороне сервера скачиваемых из сети данных |
| US8914890B2 (en) * | 2011-01-31 | 2014-12-16 | International Business Machines Corporation | Determining the vulnerability of computer software applications to privilege-escalation attacks |
| KR101039874B1 (ko) | 2011-04-04 | 2011-06-09 | (주)한국전산감리원 | 정보통신 통합플랫폼 테스트 시스템 |
| CN102137115A (zh) * | 2011-04-22 | 2011-07-27 | 南京邮电大学 | 通信网恶意代码攻击效果评估方法 |
| CN102185847B (zh) * | 2011-04-22 | 2014-05-07 | 南京邮电大学 | 基于熵值法的恶意代码网络攻击评估方法 |
| US9098815B2 (en) * | 2011-05-13 | 2015-08-04 | Bank Of America Corporation | Presentation of an interactive user interface |
| WO2012166194A1 (fr) * | 2011-06-01 | 2012-12-06 | Hewlett-Packard Development Company, L.P. | Gestion d'informations d'actif de réseau |
| US9894261B2 (en) | 2011-06-24 | 2018-02-13 | Honeywell International Inc. | Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface |
| WO2013020165A2 (fr) | 2011-08-05 | 2013-02-14 | HONEYWELL INTERNATIONAL INC. Attn: Patent Services | Systèmes et procédés de gestion de données vidéo |
| US10362273B2 (en) | 2011-08-05 | 2019-07-23 | Honeywell International Inc. | Systems and methods for managing video data |
| KR101310208B1 (ko) * | 2011-10-13 | 2013-09-24 | 서울여자대학교 산학협력단 | 보안 요구사항의 우선순위 결정 방법 |
| US20130305091A1 (en) * | 2012-05-09 | 2013-11-14 | Ixia | Drag and drop network topology editor for generating network test configurations |
| US9178897B2 (en) * | 2012-07-03 | 2015-11-03 | The Boeing Company | Methods and systems for use in identifying cyber-security threats in an aviation platform |
| US9065746B2 (en) * | 2012-08-24 | 2015-06-23 | Vce Company, Llc | Compliance testing engine for integrated computing system |
| US9455993B2 (en) * | 2013-03-13 | 2016-09-27 | Lookingglass Cyber Solutions, Inc. | Computer network attribute bilateral inheritance |
| US9798981B2 (en) * | 2013-07-31 | 2017-10-24 | Entit Software Llc | Determining malware based on signal tokens |
| US9390269B2 (en) * | 2013-09-30 | 2016-07-12 | Globalfoundries Inc. | Security testing using semantic modeling |
| US10523903B2 (en) | 2013-10-30 | 2019-12-31 | Honeywell International Inc. | Computer implemented systems frameworks and methods configured for enabling review of incident data |
| US9231938B2 (en) * | 2014-01-15 | 2016-01-05 | International Business Machines Corporation | Determination and classification of defense measures in web applications |
| US9680855B2 (en) | 2014-06-30 | 2017-06-13 | Neo Prime, LLC | Probabilistic model for cyber risk forecasting |
| US9705849B2 (en) * | 2014-09-30 | 2017-07-11 | Intel Corporation | Technologies for distributed detection of security anomalies |
| US10095869B2 (en) | 2015-09-24 | 2018-10-09 | International Business Machines Corporation | Machine learning statistical methods estimating software system's security analysis assessment or audit effort, cost and processing decisions |
| US9912686B2 (en) * | 2016-02-18 | 2018-03-06 | Tracker Networks Inc. | Methods and systems for enhancing data security in a computer network |
| JP6355668B2 (ja) * | 2016-03-15 | 2018-07-11 | 三菱電機株式会社 | 診断結果統合装置および診断結果統合プログラム |
| CN106201833A (zh) * | 2016-06-30 | 2016-12-07 | 北京小米移动软件有限公司 | WiFi信号图标的展示方法、装置和移动终端 |
| US10284588B2 (en) | 2016-09-27 | 2019-05-07 | Cisco Technology, Inc. | Dynamic selection of security posture for devices in a network using risk scoring |
| WO2018094516A1 (fr) | 2016-11-25 | 2018-05-31 | Cybernetiq, Inc. | Système de commande et de visualisation de configuration de sécurité de réseau informatique |
| US10699008B2 (en) | 2017-05-17 | 2020-06-30 | Threatmodeler Software Inc. | Threat model chaining and attack simulation systems and related methods |
| US10255439B2 (en) | 2017-05-17 | 2019-04-09 | Threatmodeler Software Inc. | Threat modeling systems and related methods including compensating controls |
| US10984112B2 (en) | 2017-05-17 | 2021-04-20 | Threatmodeler Software Inc. | Systems and methods for automated threat modeling of an existing computing environment |
| US11620386B2 (en) | 2017-05-17 | 2023-04-04 | Threatmodeler Software Inc. | Threat modeling systems and related methods including mitigating components |
| US11159559B2 (en) | 2017-05-17 | 2021-10-26 | Threatmodeler Software Inc. | Systems and methods for importing diagrams for automated threat modeling |
| US11568059B2 (en) | 2017-05-17 | 2023-01-31 | Threatmodeler Software Inc. | Systems and methods for automated threat model generation from diagram files |
| US10747876B2 (en) * | 2017-05-17 | 2020-08-18 | Threatmodeler Software Inc. | Systems and methods for assisted model generation |
| US11314872B2 (en) | 2017-05-17 | 2022-04-26 | Threatmodeler Software Inc. | Systems and methods for automated threat modeling when deploying infrastructure as a code |
| US10200399B2 (en) * | 2017-05-17 | 2019-02-05 | Threatmodeler Software Inc. | Threat model chaining and attack simulation systems and methods |
| US10713366B2 (en) | 2017-05-17 | 2020-07-14 | Threatmodeler Software Inc. | Systems and methods for automated threat model generation from third party diagram files |
| US11227032B1 (en) | 2017-05-24 | 2022-01-18 | Amazon Technologies, Inc. | Dynamic posture assessment to mitigate reverse engineering |
| US10706156B2 (en) * | 2017-10-13 | 2020-07-07 | 1230604 BC Ltd. | Security risk identification in a secure software lifecycle |
| US11636416B2 (en) | 2017-11-13 | 2023-04-25 | Tracker Networks Inc. | Methods and systems for risk data generation and management |
| CN108494806B (zh) * | 2018-05-29 | 2019-03-08 | 广西电网有限责任公司 | 基于人工智能的网络威胁预警监测系统 |
| US11122059B2 (en) * | 2018-08-20 | 2021-09-14 | Bank Of America Corporation | Integrated resource landscape system |
| WO2020140153A1 (fr) | 2019-01-04 | 2020-07-09 | Cybernetiq, Inc. | Visualisation de chemins de réseau permis par un pare-feu pour évaluer la sécurité d'une configuration de réseau |
| CN109688159B (zh) * | 2019-01-23 | 2023-01-17 | 平安科技(深圳)有限公司 | 网络隔离违规识别方法、服务器及计算机可读存储介质 |
| US10644943B1 (en) * | 2019-03-27 | 2020-05-05 | Juniper Networks, Inc. | Multilayer and interactive user interfaces for displaying features of an optimized network plan |
| US11645603B1 (en) * | 2019-12-17 | 2023-05-09 | Wells Fargo Bank, N.A. | Computer system for automatic alert assessment |
| CN111709623A (zh) * | 2020-06-04 | 2020-09-25 | 中国科学院计算机网络信息中心 | 高性能计算环境评价方法、装置、电子设备及存储介质 |
| CN111723377B (zh) * | 2020-06-17 | 2023-02-07 | 中国电子信息产业集团有限公司第六研究所 | 一种平台脆弱性的评估方法、装置、电子设备及存储介质 |
| US12184699B2 (en) * | 2020-09-18 | 2024-12-31 | Prama, Inc. | Method and a system for providing security and access control in a network model |
| CN114519450A (zh) * | 2021-12-17 | 2022-05-20 | 贵州电网有限责任公司 | 一种适用于新型电力系统的配电网态势感知方法及系统 |
| US11588702B1 (en) | 2022-01-12 | 2023-02-21 | Ciena Corporation | 3D visualization of multi-layer networks including network topology and encapsulation |
| CN115314250A (zh) * | 2022-07-06 | 2022-11-08 | 北京神州安付科技股份有限公司 | 一种基于传输参数的信息安全态势分析方法与系统 |
| CN120017288B (zh) * | 2023-11-14 | 2025-11-04 | 上海交通大学 | 基于访问上下文逻辑推理的信息系统访问风险评估方法 |
| CN119299158A (zh) * | 2024-10-09 | 2025-01-10 | 北京锦岳智慧科技有限公司 | 一种基于模糊评测的暴露面量化评估方法及系统 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5684957A (en) * | 1993-03-29 | 1997-11-04 | Hitachi Software Engineering Co., Ltd. | Network management system for detecting and displaying a security hole |
| US5812763A (en) * | 1988-02-17 | 1998-09-22 | Digital Equipment Corporation | Expert system having a plurality of security inspectors for detecting security flaws in a computer system |
| WO1999056195A1 (fr) * | 1998-04-30 | 1999-11-04 | Bindview Development Corporation | Securite informatique |
Family Cites Families (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5138321A (en) | 1991-10-15 | 1992-08-11 | International Business Machines Corporation | Method for distributed data association and multi-target tracking |
| US5485409A (en) | 1992-04-30 | 1996-01-16 | International Business Machines Corporation | Automated penetration analysis system and method |
| US5528516A (en) * | 1994-05-25 | 1996-06-18 | System Management Arts, Inc. | Apparatus and method for event correlation and problem reporting |
| AU5174396A (en) | 1995-03-31 | 1996-10-16 | Abb Power T & D Company Inc. | System for optimizing power network design reliability |
| US5699403A (en) * | 1995-04-12 | 1997-12-16 | Lucent Technologies Inc. | Network vulnerability management apparatus and method |
| US5787235A (en) * | 1995-05-09 | 1998-07-28 | Gte Government Systems Corporation | Fuzzy logic-based evidence fusion tool for network analysis |
| US5745382A (en) | 1995-08-31 | 1998-04-28 | Arch Development Corporation | Neural network based system for equipment surveillance |
| US5751965A (en) * | 1996-03-21 | 1998-05-12 | Cabletron System, Inc. | Network connection status monitor and display |
| US5892903A (en) * | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
| US5963653A (en) | 1997-06-19 | 1999-10-05 | Raytheon Company | Hierarchical information fusion object recognition system and method |
| US6020889A (en) * | 1997-11-17 | 2000-02-01 | International Business Machines Corporation | System for displaying a computer managed network layout with varying transience display of user selected attributes of a plurality of displayed network objects |
| US6054987A (en) * | 1998-05-29 | 2000-04-25 | Hewlett-Packard Company | Method of dynamically creating nodal views of a managed network |
| AU4568299A (en) * | 1998-06-15 | 2000-01-05 | Dmw Worldwide, Inc. | Method and apparatus for assessing the security of a computer system |
| US6282546B1 (en) * | 1998-06-30 | 2001-08-28 | Cisco Technology, Inc. | System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment |
| US6324656B1 (en) * | 1998-06-30 | 2001-11-27 | Cisco Technology, Inc. | System and method for rules-driven multi-phase network vulnerability assessment |
| US6269447B1 (en) * | 1998-07-21 | 2001-07-31 | Raytheon Company | Information security analysis system |
| US6415321B1 (en) * | 1998-12-29 | 2002-07-02 | Cisco Technology, Inc. | Domain mapping method and system |
| US6301668B1 (en) * | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
| US6499107B1 (en) * | 1998-12-29 | 2002-12-24 | Cisco Technology, Inc. | Method and system for adaptive network security using intelligent packet analysis |
| US6883101B1 (en) * | 2000-02-08 | 2005-04-19 | Harris Corporation | System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules |
-
2000
- 2000-02-08 US US09/500,108 patent/US7096502B1/en not_active Expired - Lifetime
-
2001
- 2001-01-31 AT AT01924088T patent/ATE300145T1/de not_active IP Right Cessation
- 2001-01-31 KR KR1020027010256A patent/KR100673823B1/ko not_active Expired - Lifetime
- 2001-01-31 EP EP01924088A patent/EP1254551B1/fr not_active Expired - Lifetime
- 2001-01-31 CA CA002397375A patent/CA2397375A1/fr not_active Abandoned
- 2001-01-31 DE DE60112044T patent/DE60112044T2/de not_active Expired - Lifetime
- 2001-01-31 JP JP2001559232A patent/JP4688395B2/ja not_active Expired - Lifetime
- 2001-01-31 WO PCT/US2001/003105 patent/WO2001060024A2/fr not_active Ceased
- 2001-01-31 CN CNB018046037A patent/CN1172507C/zh not_active Expired - Fee Related
- 2001-01-31 AU AU2001250773A patent/AU2001250773A1/en not_active Abandoned
- 2001-03-27 TW TW090102784A patent/TW550913B/zh not_active IP Right Cessation
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5812763A (en) * | 1988-02-17 | 1998-09-22 | Digital Equipment Corporation | Expert system having a plurality of security inspectors for detecting security flaws in a computer system |
| US5684957A (en) * | 1993-03-29 | 1997-11-04 | Hitachi Software Engineering Co., Ltd. | Network management system for detecting and displaying a security hole |
| WO1999056195A1 (fr) * | 1998-04-30 | 1999-11-04 | Bindview Development Corporation | Securite informatique |
Non-Patent Citations (1)
| Title |
|---|
| HENNING R R ET AL: "THE NETWORK VULNERABILITY TOOL (NVT) - A SYSTEM VULNERABILITY VISUALIZATION ARCHITECTURE", NATIONAL INFORMATION SYSTEMS SECURITY CONFERENCE, XX, XX, vol. 1, 18 October 1999 (1999-10-18), pages 97 - 111, XP001031568 * |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8941464B2 (en) | 2005-10-21 | 2015-01-27 | Honeywell International Inc. | Authorization system and a method of authorization |
| US9019070B2 (en) | 2009-03-19 | 2015-04-28 | Honeywell International Inc. | Systems and methods for managing access control devices |
| US9280365B2 (en) | 2009-12-17 | 2016-03-08 | Honeywell International Inc. | Systems and methods for managing configuration data at disconnected remote devices |
| US9344684B2 (en) | 2011-08-05 | 2016-05-17 | Honeywell International Inc. | Systems and methods configured to enable content sharing between client terminals of a digital video management system |
Also Published As
| Publication number | Publication date |
|---|---|
| DE60112044T2 (de) | 2006-08-10 |
| TW550913B (en) | 2003-09-01 |
| EP1254551A2 (fr) | 2002-11-06 |
| CN1398481A (zh) | 2003-02-19 |
| CN1172507C (zh) | 2004-10-20 |
| JP2003523140A (ja) | 2003-07-29 |
| US7096502B1 (en) | 2006-08-22 |
| AU2001250773A1 (en) | 2001-08-20 |
| JP4688395B2 (ja) | 2011-05-25 |
| DE60112044D1 (de) | 2005-08-25 |
| EP1254551B1 (fr) | 2005-07-20 |
| ATE300145T1 (de) | 2005-08-15 |
| CA2397375A1 (fr) | 2001-08-16 |
| WO2001060024A2 (fr) | 2001-08-16 |
| KR20020081311A (ko) | 2002-10-26 |
| KR100673823B1 (ko) | 2007-01-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2001060024A3 (fr) | Systeme et procede d'evaluation de la posture de securite d'un reseau | |
| AU2001237979A1 (en) | System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules | |
| WO2005040971A3 (fr) | Systeme et modele de relations de collaboration fondees sur des valeurs de rendement | |
| WO2006062815A3 (fr) | Systeme et procede de creation de programmes cognitifs | |
| EP1417603A4 (fr) | Test de penetration automatise servant a controler la securite d'un systeme d'ordinateur | |
| WO2005054927A3 (fr) | Systeme et procede pour optimiser des modeles de systemes optiques et numeriques | |
| IL158911A0 (en) | System and method for analyzing structured message stream data | |
| AU2003224705A1 (en) | Neuron signal analysis system and method | |
| GB2391984A (en) | System and method for generating forecasts and analysis of contact center behaviour for planning purposes | |
| WO2001046798A8 (fr) | Systeme et procede d'analyse de dependances assistee par ordinateur utilisant des graphiques | |
| ATE532289T1 (de) | System und verfahren für computersicherheit unter verwendung mehrerer käfige | |
| NZ334787A (en) | Establishing animal condition by analysis of area movements | |
| WO2006039102A3 (fr) | Systeme, logiciel et procede d'expertise d'une base de donnees dans un environnement de comptabilite judiciaire | |
| WO2004044817A3 (fr) | Systeme et procede permettant d'evaluer la capacite fonctionnelle ou l'etat pathologique d'un acteur | |
| AU2001249785A1 (en) | Method, computer program, and system for automated real-time signal analysis fordetection, quantification, and prediction of signal changes | |
| WO1999013427A3 (fr) | Systeme et procede pour detecter et combattre les fraudes | |
| EP1579608A4 (fr) | Procede, programme informatique et systeme pour la decomposition, le filtrage et l'analyse automatise de signaux d'origine arbitraire ou a echelle de temps arbitraire, sur leur echelle de temps intrinseque | |
| WO2002019602A3 (fr) | Modelisation statistique permettant l'analyse de grands tableaux de donnees | |
| WO1999067602A8 (fr) | Systeme et procede informatiques servant a expliquer le comportement d'un modele faisant correspondre des donnees d'entree a des donnees de sortie | |
| SE0103361D0 (sv) | Object oriented data processing | |
| CA2465155A1 (fr) | Recommandations visant l'antememorisation intelligente des donnees | |
| WO2004061620A3 (fr) | Analyse d'affinite temporelle utilisant des signatures de reutilisation | |
| WO2002056135A3 (fr) | Systeme et procede fournissant une analyse et une interpretation de donnees | |
| WO2004097596A3 (fr) | Procede, systeme et programme d'identification de coordonnees securisee | |
| MXPA02009476A (es) | Sistema y metodo para analisis de sensibilidad de transision de modelo. |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2397375 Country of ref document: CA |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2001924088 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 018046037 Country of ref document: CN |
|
| ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2001 559232 Kind code of ref document: A Format of ref document f/p: F |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 1020027010256 Country of ref document: KR |
|
| WWP | Wipo information: published in national office |
Ref document number: 1020027010256 Country of ref document: KR |
|
| WWP | Wipo information: published in national office |
Ref document number: 2001924088 Country of ref document: EP |
|
| REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
| WWG | Wipo information: grant in national office |
Ref document number: 2001924088 Country of ref document: EP |